A network administrator would MOST likely use a port scanner to do which of the following?

A. Capture incoming network packets to port 80 on a workstation.
B. Trace a physical network port through a building.
C. Remotely test a firewall configuration on a server.
D. Report the link speed and duplex of all ports on a switch

Answer: C. Remotely test a firewall configuration on a server.

Computer Science & Information Technology

You might also like to view...

What type of tunnel is created between the client computer and a DirectAccess server, and is used for control of the DirectAccess connection?

A. Infrastructure tunnel B. Intranet tunnel C. Internet tunnel D. Split tunnel

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Examples of a pseudorandom function are decryption keys and nonces. 2. If the PRF does not generate effectively random 128-bit output values it may be possible for an adversary to narrow the possibilities and successfully use a brute force attack. 3. The purpose of the Maurer's universal statistical test is to determine whether the number of ones and zeros in a sequence are approximately the same as would be expected for a truly random sequence. 4. The seed that serves as input to the PRNG must be secure for cryptographic applications. 5. Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric ciphers, and hash functions and message authentication codes.

Computer Science & Information Technology